github.com/swisspost/terratest@v0.0.0-20230214120104-7ec6de2e1ae0/test/azure/terraform_azure_keyvault_example_test.go (about) 1 //go:build azure 2 // +build azure 3 4 // NOTE: We use build tags to differentiate azure testing because we currently do not have azure access setup for 5 // CircleCI. 6 7 package test 8 9 import ( 10 "testing" 11 12 "github.com/gruntwork-io/terratest/modules/azure" 13 "github.com/gruntwork-io/terratest/modules/random" 14 "github.com/gruntwork-io/terratest/modules/terraform" 15 "github.com/stretchr/testify/assert" 16 ) 17 18 func TestTerraformAzureKeyVaultExample(t *testing.T) { 19 t.Parallel() 20 21 uniquePostfix := random.UniqueId() 22 23 // website::tag::1:: Configure Terraform setting up a path to Terraform code. 24 terraformOptions := &terraform.Options{ 25 // The path to where our Terraform code is located 26 TerraformDir: "../../examples/azure/terraform-azure-keyvault-example", 27 Vars: map[string]interface{}{ 28 "postfix": uniquePostfix, 29 }, 30 } 31 32 // website::tag::6:: At the end of the test, run `terraform destroy` to clean up any resources that were created 33 defer terraform.Destroy(t, terraformOptions) 34 35 // website::tag::2:: Run `terraform init` and `terraform apply`. Fail the test if there are any errors. 36 terraform.InitAndApply(t, terraformOptions) 37 38 // website::tag::3:: Run `terraform output` to get the values of output variables 39 resourceGroupName := terraform.Output(t, terraformOptions, "resource_group_name") 40 keyVaultName := terraform.Output(t, terraformOptions, "key_vault_name") 41 expectedSecretName := terraform.Output(t, terraformOptions, "secret_name") 42 expectedKeyName := terraform.Output(t, terraformOptions, "key_name") 43 expectedCertificateName := terraform.Output(t, terraformOptions, "certificate_name") 44 45 // website::tag::4:: Determine whether the keyvault exists 46 keyVault := azure.GetKeyVault(t, resourceGroupName, keyVaultName, "") 47 assert.Equal(t, keyVaultName, *keyVault.Name) 48 49 // website::tag::5:: Determine whether the secret, key, and certificate exists 50 secretExists := azure.KeyVaultSecretExists(t, keyVaultName, expectedSecretName) 51 assert.True(t, secretExists, "kv-secret does not exist") 52 53 keyExists := azure.KeyVaultKeyExists(t, keyVaultName, expectedKeyName) 54 assert.True(t, keyExists, "kv-key does not exist") 55 56 certificateExists := azure.KeyVaultCertificateExists(t, keyVaultName, expectedCertificateName) 57 assert.True(t, certificateExists, "kv-cert does not exist") 58 }